Kyndryl partners with Dell on post-ransomware resiliency

Read Time:1 Minute, 42 Second

Continuing its strategy of openness and partnership, Kyndryl approached Dell to propose a data restoration offer after a ransomware attack. It is based on Dell’s cyber-resilience solutions.

Kris Lovejoy, head of s

An independent company, Kyndryl multiplies partnerships to meet customer needs. Latest agreement to date with Dell to offer a data recovery and IS reconstruction offer after a cyberattack, in particular by ransomware. The service is called Cyber ​​Incident Recovery and includes 4 axes, specifies Kris Lovejoy, head of global security and resilience at Kyndryl. It is based on Dell’s PowerProtect Cyber ​​Recovery solution.

The latter provides an orchestration tool that gives users the means to react in a programmed and immediate way to a cybersecurity event. Then, an analysis engine based on machine learning (Cybersense) regularly checks the integrity of the system configuration data (to ensure that it has not been compromised by hackers). Another tool looks at business resiliency planning and implementation.

Guarantee the quality of backups

The fourth tier of Dell’s offering provides a repository of known-good backups for rapid, automated recovery in the event of a major system compromise. According to Kris Lovejoy, the idea behind this newly strengthened partnership is to bridge a gap between cybersecurity and PRA/PCA, especially when it comes to ransomware. “This is an important issue facing the market, which we have been working on for a long time,” she said. “Ransomware highlights security gaps within companies,” she adds.

Among these shortcomings is the ability to restore systems after a ransomware attack. This restart requires backups and healthy configuration data. “Imagine your entire infrastructure has been locked down – an incident response company helps you contain the event, then the question is how do you restore it? says Kris Lovejoy. “You have to assume that you have storage [utilisable]you should assume that you have a system configuration [utilisable], and this is often not accurate. It can also be added that the restore job may take a while, to the point that the company may choose to pay the ransom to go faster.

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Forcepoint One Unites Zero Trust And Sase In A Single Previous post Forcepoint One unites zero trust and SASE in a single security platform
S3 Now Accessible Locally On Aws Outposts Next post S3 now accessible locally on AWS Outposts